Overarching: Content: What content does the enterprise have and what are the consequences of protection failures?

Options:

Fill in the table by identifying relevant content types with examples and removing or replacing consequences identified.

Decision:

Identify each content type present and associate consequences
associated with loss of integrity (I), availability (A),
confidentiality (C), control over use (U), accountability
(T), transparency (R), and custody (S) for each type:

For identified situations, associate content
and failure modes that might produce identified consequences (and the
consequence types) as a result of loss of integrity (I), availability
(A), confidentiality (C), control over use (U), accountability
(T), transparency (R), and Custody (S) and supply details of the
basis for this conclusion.

For example, a temperature control system might have LOW
consequences in a small automated photographic developing facility, a
MEDIUM consequence in a food production facility (where redundant
tests identify a "bad batch"), and HIGH consequences in a chemical
plant where its failure causes a major explosion.

Typically, consequences resulting from information protection
failures are associated with a loss of integrity (I), availability
(A), confidentiality (C), control over use (U), accountability (T),
transparency (R), and custody (S) in an information system, with the ultimate
result leading to real-world effects through the impact of the
failures on the control system.